|
R. Anderson and T. Lomas, ''Fortifying key negotiation schemes with poorly chosen passwords,'''' Electronics Letters, vol. 30, no. 13, pp. 1040-1041, 1994. G. Ateniese, M. Steiner, G. Tsudik, ''New multiparty authentication services and key agreement protocols,'''' IEEE. Selected Areas in Comm., vol. 18, no. 4, pp.628-639, Apr. 2000. M. Bellare, D. Pointcheval and P. Rogaway, ''Authenticated key exchange secure against dictionary attack,'''' Proceedings of Advances in Cryptology - Eurocrypt 2000, pp. 139-155, 2000. S. Bellovin, M. Merritt, ''Encrypted key exchange:password-based protocols secure against dictionary attack,'''' IEEE Symposium on Research in Security and Privacy, pp. 72-84, 1992. S. Bellovin and M. Merritt, ''Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password-life compromise,'''' ACM Conference on Computer and Communications Security, pp. 244-250, 1993. M. Boyarsky, ''Public-key cryptography and password protocols: the multi-user case,'''' ACM Conference on Computer and Communication Security, pp. 63-72September 16, 1999. V. Boyko, P. Mackenzie and S. Patel, ''Provably secure password authenticated key exchange using Diffie-Hellman,'''' Proceedings of Advances in Cryptology - Eurocrypt 2000, pp. 156-171, 2000. U. Feige, A. Fiat, A. Shamir, ''Zero-knowledge Proof of Identity,'''' Journal of Cryptology, vol. 1, pp.77-94, 1988. L. Gong, ''Optimal authentication protocols resistant to password guessing attacks,'''' IEEE Computer Security Foundation Workshop, pp. 24-29, June 1995. L. Gong, M. Lomas, R. Needham, and J. Saltzer, ''Protecting poorly chosen secrets from guessing attacks,'''' IEEE Journal on SAC., vol. 11, no. 5, pp. 648-656, June 1993. S. Halevi and Krawczyk, ''Public-key cryptography and password protocols,'''' ACM Conference on Computer and Communications Security, pp. 122-131, 1998. D. Jablon, ''Strong password-only authenticated key exchange,'''' ACM Computer Communications Review, vol. 26, no. 5, pp. 5-26, 1996. D. Jablon, ''Extended password key exchange protocols,'''' WETICE Workshop on Enterprise Security, 1997. T. Kwon and J. Song, ''Efficient key exchange and authentication protocols protecting weak secrets,'''' IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. E81-A, no. 1, pp. 156-163, January 1998. T. Kwon and J. Song, ''Secure agreement scheme for $g^{xy}$ via password authentication,'''' Electronics Letters, vol. 35, no. 11, pp. 892-893, 27th May 1999. M. Lomas, L. Gong, J. Saltzer, and R. Needham, ''Reducing rishks from poorly chosen keys,'''' ACM Symposium on Operating System Principles, ACM Operating Systems Review, pp. 14-18, 1989. S. Lucks, ''Open key exchange: how to defeat dictionary attacks without encrypting public-keys,'''' The Security Protocol Workshop ''97, pp. 79-90, April 7-9, 1997. P. Mackenzie and R. Swaminathan, ''Secure network authentication with password identification,'''' Presented to IEEE p1363a, August 1999. D. Pointcheval, J. Stern. ''Security proofs for signatue schemes,'''' in Proceedings of Advances in Cryptology - Eurocrypt ''96, Lecture Notes in Computer Science 1070,Springer-Verlag, pp. 387-398, 1996. M. Roe, B. Christianson, D. Wheeler, ''Secure sessions from weak secrets,'''' Technical report from University of Cambridge and University of Hertfordshire, 1998. M. Steiner, G. Tsudik, and M. Waidner, ''Refinement and extension of encrypted key exchange,'''' ACM Operating Systems Review, vol. 29, no. 3, pp. 22-30, 1995. M. Steiner, G. Tsudik, M. Waidner, ''Diffie-Hellman key distribution ex-tended to group communication,'''' in Third ACM Conference on Computer and Communications Security, pp. 31-37, Mar. 1996, ACM Press. M. Steiner, G. Tsudik, M. Waidner, ''CLIQUES: A new approach to group key agreement,'''' in Proceedings of the 18th International Conference on Distributed Computing Systems (ICDCS''98)'''', Amsterdam, May 1998, pp. 380-387, IEEE Computer Society Press. M. Steiner, G. Tsudik, M. Waidner, ''Key agreement in dynamic peer groups,'''' IEEE Transactions on Parallel and Distributed Systems, Vo1. 11, No. 8, pp. 769-780, August 2000. G. Tsudik, E. van Herreweghen, ''Some remarks on protecting weak and poorly-chosen secrets from guessing attacks,'''' IEEE Computer Security Foundation Workshop, pp. 136-142, 1993. W.G. Tzeng, Z.J. Tzeng, ''Round-efficient conference key agreement protocols with provable security,'''' Proceedings of Advances in Cryptology - Asiacrypt 2000, pp. 614-628, 2000. T. Wu, ''Secure remote password protocol,'''' Internet Society Symposium on Network and Distributed System Security, 1998.
|